We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50057

usb: typec: tipd: Free IRQ only if it was requested before



AssignerLinux
Reserved2024-10-21
Published2024-10-21
Updated2024-11-05

Description

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Free IRQ only if it was requested before In polling mode, if no IRQ was requested there is no need to free it. Call devm_free_irq() only if client->irq is set. This fixes the warning caused by the tps6598x module removal: WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c ... ... Call trace: devm_free_irq+0x80/0x8c tps6598x_remove+0x28/0x88 [tps6598x] i2c_device_remove+0x2c/0x9c device_remove+0x4c/0x80 device_release_driver_internal+0x1cc/0x228 driver_detach+0x50/0x98 bus_remove_driver+0x6c/0xbc driver_unregister+0x30/0x60 i2c_del_driver+0x54/0x64 tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x] __arm64_sys_delete_module+0x184/0x264 invoke_syscall+0x48/0x110 el0_svc_common.constprop.0+0xc8/0xe8 do_el0_svc+0x20/0x2c el0_svc+0x28/0x98 el0t_64_sync_handler+0x13c/0x158 el0t_64_sync+0x190/0x194

Product status

Default status
unaffected

1da177e4c3f4 before b72bf5cade51
affected

1da177e4c3f4 before 4d4b23c11954
affected

1da177e4c3f4 before db63d9868f7f
affected

Default status
affected

6.6.57
unaffected

6.11.4
unaffected

6.12-rc1
unaffected

References

https://git.kernel.org/stable/c/b72bf5cade51ba4055c8a8998d275e72e6b521ce

https://git.kernel.org/stable/c/4d4b23c119542fbaed2a16794d3801cb4806ea02

https://git.kernel.org/stable/c/db63d9868f7f310de44ba7bea584e2454f8b4ed0

cve.org CVE-2024-50057

nvd.nist.gov CVE-2024-50057

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.